name |
Oberthur Carte à puce ID-One Cosmo V7.0-a en configuration Standard et Basic
|
ID-One Cosmo V7.0-a SmartCard in configuration Standard and Basic
|
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
not_valid_before |
2009-11-19
|
2009-11-19
|
not_valid_after |
2019-09-01
|
2019-09-01
|
scheme |
FR
|
FR
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-cible_2009-46en.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-cible_2009-46en.pdf
|
status |
archived
|
archived
|
manufacturer |
Oberthur Technologies / ATMEL Secure Microcontroller Solutions
|
Oberthur Card System / Philips (NXP)
|
manufacturer_web |
https://www.oberthur.com/
|
https://www.oberthur.com/
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc_2009-46en.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc_2009-46en.pdf
|
cert_link |
None
|
None
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'JavaCard System Standard 2.2 Configuration Protection Profile, Version 1.0b', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/jcsppc.pdf', 'pp_ids': None}) |
|
maintenance_updates |
|
|
state |
- _type:
sec_certs.sample.cc.CCCertificate.InternalState
- report:
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
True
- convert_garbage:
False
- convert_ok:
True
- extract_ok:
True
- pdf_hash:
89ac72c45dd136d36fc2cb90386d0feca9d48a2cdaabc95dd998e3ef27285e5f
- txt_hash:
7dfed007684fed834cf8d356cd256d63c99367e41e3dde29250bad902f85a503
- st:
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
True
- convert_garbage:
False
- convert_ok:
True
- extract_ok:
True
- pdf_hash:
17b2a3fb1f0bba923dce5dc39b934d34dfa037f60cec5ff37e7162e2a991b944
- txt_hash:
1f1642d36f4c29423f63af47eb59df1a8d5114bd9975f3a761d3567d8cc39c59
- cert:
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
- _type:
sec_certs.sample.cc.CCCertificate.InternalState
- report:
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
True
- convert_garbage:
False
- convert_ok:
True
- extract_ok:
True
- pdf_hash:
89ac72c45dd136d36fc2cb90386d0feca9d48a2cdaabc95dd998e3ef27285e5f
- txt_hash:
7dfed007684fed834cf8d356cd256d63c99367e41e3dde29250bad902f85a503
- st:
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
True
- convert_garbage:
False
- convert_ok:
True
- extract_ok:
True
- pdf_hash:
17b2a3fb1f0bba923dce5dc39b934d34dfa037f60cec5ff37e7162e2a991b944
- txt_hash:
1f1642d36f4c29423f63af47eb59df1a8d5114bd9975f3a761d3567d8cc39c59
- cert:
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
ANSSI-CC-2009/46
|
ANSSI-CC-2009/46
|
heuristics/cert_lab |
THALES |
THALES |
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_sars |
AVA_MSU.3, ADV_IMP.2, AVA_VAN.5, AVA_VLA.4, ALC_DVS.2 |
AVA_MSU.3, ADV_IMP.2, AVA_VAN.5, AVA_VLA.4, ALC_DVS.2 |
heuristics/extracted_versions |
7.0 |
7.0 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
ANSSI-CC-2010/37, ANSSI-CC-2011/01, ANSSI-CC-2010/26, ANSSI-CC-2012/10 |
None
|
heuristics/report_references/directly_referencing |
ANSSI-CC-2009/11 |
None
|
heuristics/report_references/indirectly_referenced_by |
ANSSI-CC-2010/39, ANSSI-CC-2010/26, ANSSI-CC-2010/58, ANSSI-CC-2010/37, ANSSI-CC-2013/70, ANSSI-CC-2011/01, ANSSI-CC-2012/10 |
None
|
heuristics/report_references/indirectly_referencing |
ANSSI-CC-2009/11 |
None
|
heuristics/scheme_data |
- product:
Carte à puce ID-One Cosmo V7.0-a en configuration Standard et Basic
- url:
https://cyber.gouv.fr/produits-certifies/carte-puce-id-one-cosmo-v70-en-configuration-standard-et-basic
- description:
Le produit évalué est la carte à puce ID-One Cosmo V7.0-a, plate-forme Java Card ouverte, développée par Oberthur Technologies :
- compatible avec les spécifications de Java Card 2.2.2 et de VISA GlobalPlatform 2.1.1 ;
- masquée sur des variantes (par la taille mémoire et les interfaces offertes) d'une même famille de composants développées par Atmel Secure Microcontroller Solutions ;
- ma
- sponsor:
Oberthur Technologies
- developer:
Oberthur Technologies - ATMEL Secure Microcontroller Solutions
- cert_id:
2009/46
- level:
EAL5+
- enhanced:
- cert_id:
2009/46
- certification_date:
19/11/2009
- category:
Cartes à puce
- cc_version:
Critères Communs version 3.1
- developer:
Oberthur Technologies - ATMEL Secure Microcontroller Solutions
- sponsor:
Oberthur Technologies
- evaluation_facility:
THALES - CEACI
- level:
EAL5+
- protection_profile:
PP/0304
- mutual_recognition:
SOG-IS
CCRA
- augmented:
ADV_IMP.2, ALC_DVS.2, AVA_VAN.5
- target_link:
https://cyber.gouv.fr/sites/default/files/IMG/certificat/anssi-cc-cible_2009-46en.pdf
- report_link:
https://cyber.gouv.fr/sites/default/files/IMG/certificat/anssi-cc_2009-46en.pdf
|
None
|
heuristics/st_references/directly_referenced_by |
ANSSI-CC-2010/39, ANSSI-CC-2010/26, ANSSI-CC-2010/36, ANSSI-CC-2010/37, ANSSI-CC-2010/38 |
None
|
heuristics/st_references/directly_referencing |
BSI-DSZ-CC-0421-2008, ANSSI-CC-2009/11 |
None
|
heuristics/st_references/indirectly_referenced_by |
ANSSI-CC-2010/39, ANSSI-CC-2010/26, ANSSI-CC-2010/36, ANSSI-CC-2010/37, ANSSI-CC-2010/38 |
None
|
heuristics/st_references/indirectly_referencing |
BSI-DSZ-CC-0421-2008, ANSSI-CC-2009/11 |
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data |
- _type:
sec_certs.sample.cc.CCCertificate.PdfData
- report_metadata:
- pdf_file_size_bytes:
244131
- pdf_is_encrypted:
False
- pdf_number_of_pages:
17
- /CreationDate:
D:20100204113104+01'00'
- /Keywords:
- /Producer:
Acrobat Distiller 8.0.0 (Windows)
- /ModDate:
D:20100204113104+01'00'
- pdf_hyperlinks:
http://www.ssi.gouv.fr/, mailto:[email protected]
- st_metadata:
- pdf_file_size_bytes:
683422
- pdf_is_encrypted:
False
- pdf_number_of_pages:
95
- /CreationDate:
D:20091125162947+01'00'
- /Keywords:
- /Producer:
AFPL Ghostscript 8.50
- /ModDate:
D:20091125162947+01'00'
- pdf_hyperlinks:
- cert_metadata:
None
- report_frontpage:
- FR:
- match_rules:
Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developer\(s\)(.+)Evaluation facility(.+)Recognition arrangements
- cert_id:
ANSSI-CC-2009/46
- cert_item:
ID-One Cosmo V7.0-a SmartCard in configuration Standard and Basic JavaCard platform embedded on Atmel Secure Microcontroller Solutions components AT90SC 28872RCU Rev G and Rev E, 28848RCU Rev G and Rev E and embedded with cryptographic library version 00.03.11.05 ToolBox from Atmel Secure Microcontroller Solutions
- cert_item_version:
JavaCard Platform version for any configuration: 7.0-a Optional Code r1.0 High Secure version for each configuration: 071771, 071781 Optional Code CodopAuth r1.0 version for each configuration: 071631, 071641 ToolBox version for any configuration: 00.03.11.05
- ref_protection_profiles:
PP/0304] Java Card System - Standard 2.1.1 Configuration Protection Profile – version 1.0b, August 2003 certified by ANSSI
- cc_version:
Common Criteria version 3.1
- cc_security_level:
EAL 5 augmented ADV_IMP.2, ALC_DVS.2, AVA_VAN.5
- developer:
Oberthur Technologies1 50 quai Michelet 92300 Levallois-Perret, France ATMEL Secure Microcontroller Solutions1 Maxwell Building - Scottish Enterprise technology Park East Kilbride, G75 0QR - Ecosse, Royaume-Uni Sponsor Oberthur Technologies 50 quai Michelet, 92300 Levallois-Perret, France
- cert_lab:
THALES - CEACI (T3S – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France Phone: +33 (0)5 62 88 28 01 or 18, email : [email protected]
- st_frontpage:
None
- cert_frontpage:
None
- report_keywords:
- cc_cert_id:
- DE:
- BSI-DSZ-CC-0421-2008-MA-02:
1
- BSI-DSZ-CC-0421-:
1
- FR:
- DCSSI-2009/11:
1
- ANSSI-CC-2009/46:
18
- cc_protection_profile_id:
- cc_security_level:
- EAL:
- EAL 5:
4
- EAL4:
1
- EAL5:
1
- EAL7:
1
- EAL 4:
1
- EAL 1:
1
- EAL 3:
1
- EAL 7:
1
- EAL 5 augmented:
2
- ITSEC:
- cc_sar:
- ADO:
- ADV:
- ADV_IMP.2:
1
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_TDS:
1
- AGD:
- ALC:
- ALC_DVS.2:
3
- ALC_FLR:
2
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DVS:
1
- ALC_TAT:
1
- ATE:
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
- AVA:
- AVA_VAN.5:
1
- AVA_MSU.3:
2
- AVA_VLA.4:
2
- AVA_VAN:
1
- ASE:
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_REQ:
1
- ASE_SPD:
1
- ASE_TSS:
1
- cc_sfr:
- cc_claims:
- vendor:
- Oberthur:
- Oberthur:
2
- Oberthur Technologies:
19
- eval_facility:
- symmetric_crypto:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- crypto_scheme:
- crypto_protocol:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- crypto_library:
- vulnerability:
- side_channel_analysis:
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- SCP:
- SCP01:
1
- SCP02:
1
- SCP03:
1
- CC:
- CCMB-2006-09-001:
1
- CCMB-2007-09-002:
1
- CCMB-2007-09-003:
1
- CCMB-2007-09-004:
1
- javacard_version:
- JavaCard:
- GlobalPlatform:
- javacard_api_const:
- javacard_packages:
- certification_process:
- st_keywords:
- cc_cert_id:
- DE:
- BSI-DSZ-CC-0421-2008:
1
- BSI-DSZ-CC-0421-2008-MA-02:
1
- BSI-DSZ-CC-0421-2008-MA-01:
1
- FR:
- cc_protection_profile_id:
- cc_security_level:
- EAL:
- EAL5:
3
- EAL5+:
1
- EAL5 augmented:
3
- cc_sar:
- cc_sfr:
- FAU:
- FAU_ARP:
2
- FAU_ARP.1:
4
- FAU_SAR:
1
- FAU_SAR.1:
2
- FAU_GEN:
1
- FAU_GEN.1:
2
- FAU_SAA:
1
- FAU_SAA.1:
2
- FCO:
- FCS:
- FCS_RNG:
4
- FCS_RNG.1:
7
- FCS_RNG.1.1:
1
- FCS_RNG.1.2:
1
- FCS_CKM:
5
- FCS_CKM.1:
3
- FCS_CKM.3:
1
- FCS_CKM.3.1:
1
- FCS_CKM.4:
2
- FCS_CKM.4.1:
1
- FCS_COP:
7
- FCS_COP.1:
7
- FCS_CKM.2:
1
- FCS_CKM.2.1:
1
- FCS_COP.1.1:
1
- FCS_RND:
1
- FDP:
- FDP_IFC:
2
- FDP_IFC.1:
1
- FDP_IFF:
2
- FDP_IFF.1:
10
- FDP_RIP:
9
- FDP_RIP.1:
10
- FDP_ROL:
1
- FDP_ROL.1:
2
- FDP_SDI.2:
1
- FDP_SDI.2.1:
1
- FDP_SDI.2.2:
1
- FDP_SDI.1:
1
- FDP_SDI.1.1:
1
- FDP_ACC:
5
- FDP_ACC.2:
9
- FDP_ACF:
4
- FDP_ACF.1:
18
- FDP_UCT:
1
- FDP_UCT.1:
1
- FDP_ITC:
2
- FDP_ITC.1:
3
- FDP_IFC.2:
2
- FDP_UIT:
1
- FDP_UIT.1:
2
- FDP_ITC.2:
5
- FIA:
- FIA_ATD:
2
- FIA_ATD.1:
3
- FIA_UID:
4
- FIA_UID.2:
1
- FIA_USB.1:
2
- FIA_USB.1.1:
1
- FIA_USB.1.2:
1
- FIA_USB.1.3:
1
- FIA_AFL:
4
- FIA_AFL.1:
8
- FIA_UAU:
6
- FIA_UAU.1:
4
- FIA_UAU.4:
2
- FIA_UAU.7:
2
- FIA_UID.1:
6
- FMT:
- FMT_MSA:
11
- FMT_MSA.2:
1
- FMT_MSA.3:
8
- FMT_SMR:
6
- FMT_SMR.1:
9
- FMT_MSA.1:
6
- FMT_MTD:
3
- FMT_MTD.1:
3
- FMT_MTD.3:
1
- FMT_MTD.3.1:
1
- FMT_SMF:
4
- FMT_SMF.1:
4
- FMT_MOF:
2
- FMT_MOF.1:
2
- FMT_SMR.2:
6
- FMT_MTD.2:
2
- FPR:
- FPR_UNO.1:
5
- FPR_UNO.1.1:
1
- FPR_UNO:
4
- FPT:
- FPT_TDC.1:
3
- FPT_TDC.1.1:
1
- FPT_TDC.1.2:
1
- FPT_FLS:
5
- FPT_FLS.1:
5
- FPT_TST:
2
- FPT_TST.1:
6
- FPT_PHP:
3
- FPT_PHP.3:
2
- FPT_RCV:
3
- FPT_RCV.3:
8
- FPT_RCV.4:
1
- FPT_TDC:
1
- FPT_PHP.2:
3
- FRU:
- FRU_FLT:
1
- FRU_FLT.1:
1
- FRU_RSA:
1
- FRU_RSA.1:
1
- FTP:
- cc_claims:
- D:
- D.APP_CODE:
5
- D.APP_C_DATA:
3
- D.APP_I_DATA:
3
- D.PIN:
6
- D.JCS_CODE:
3
- D.JCS_DATA:
5
- D.SEC_DATA:
7
- D.API_DATA:
3
- D.CRYPTO:
4
- D.CONFIG:
2
- D.SENSITIVE_DATA:
1
- D.ARRAY:
3
- D.KEY:
2
- D.AUDITLOG:
1
- D.LOADFILE:
1
- D.GLPIN:
1
- D.APPLILIFECYC:
1
- D.NB_REMAINTRYGLB:
1
- O:
- O.LOAD:
3
- O.CARD-MANAGEMENT:
3
- O.SID:
1
- O.OPERATE:
1
- O.RESOURCES:
1
- O.FIREWALL:
1
- O.NATIVE:
1
- O.REALLOCATION:
1
- O.SHRD_VAR_CONFID:
1
- O.SHRD_VAR_INTEG:
1
- O.INSTALL:
1
- O.DELETION:
1
- O.OBJ-DELETION:
1
- O.ALARM:
1
- O.TRANSACTION:
1
- O.CIPHER:
1
- O.PIN-MNGT:
1
- O.KEY-MNGT:
1
- O.SECURE_COMPARE:
1
- O.SCP:
3
- O.JAVAOBJECT:
31
- O.APPLET:
16
- O.CODE_PKG:
6
- O.JAVAOBJEC:
4
- O.CODE_PCKG:
8
- T:
- T.CONFIGURATION:
2
- T.CONF_DATA_APPLET:
2
- T.PHYSICAL:
1
- T.CONFID-JCS-CODE:
1
- T.CONFID-APPLI-DATA:
1
- T.CONFID-JCS-DATA:
1
- T.INTEG-APPLI-CODE:
4
- T.INTEG-JCS-CODE:
1
- T.INTEG-APPLI-DATA:
4
- T.INTEG-JCS-DATA:
1
- T.INTEG-APPLICODE:
1
- T.INTEG-APPLIDATA:
1
- T.SID:
2
- T.EXE-CODE:
2
- T.NATIVE:
1
- T.RESSOURCES:
1
- T.INSTALL:
1
- T.DELETION:
1
- T.OBJ-DELETION:
1
- A:
- A.NATIVE:
1
- A.VERIFICATION:
1
- A.APPLET:
1
- R:
- OP:
- OP.PUT:
4
- OP.JAVA:
4
- OP.CREATE:
5
- OP.DELETE_APPLET:
3
- OP.DELETE_PCKG:
2
- OP.DELETE_PCKG_APPLET:
2
- OP.ARRAY_ACCESS:
3
- OP.INSTANCE_FIELD:
2
- OP.INVK_VIRTUAL:
3
- OP.INVK_INTERFACE:
4
- OP.THROW:
3
- OP.TYPE_ACCESS:
3
- OP.SEND:
1
- OP.RECEIVE:
1
- OE:
- OE.NATIVE:
1
- OE.VERIFICATION:
1
- OE.APPLET:
1
- OSP:
- vendor:
- Oberthur:
- Oberthur Technologies:
194
- Oberthur:
1
- OBERTHUR:
2
- eval_facility:
- symmetric_crypto:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- SHA:
- SHA1:
- SHA2:
- SHA-256:
3
- SHA-384:
2
- SHA-512:
2
- SHA-224:
1
- crypto_scheme:
- crypto_protocol:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- crypto_library:
- AtmelToolbox:
- ATMEL Toolbox 00.03.11.05:
2
- vulnerability:
- side_channel_analysis:
- SCA:
- physical probing:
2
- SPA:
1
- DPA:
1
- FI:
- physical tampering:
4
- malfunction:
2
- fault injection:
1
- other:
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- FIPS:
- FIPS PUB 46-3:
5
- FIPS PUB 81:
4
- FIPS PUB 180-2:
2
- FIPS PUB 186-2:
1
- FIPS PUB 197:
1
- FIPS 186-2:
1
- PKCS:
- javacard_version:
- JavaCard:
- GlobalPlatform:
- javacard_api_const:
- javacard_packages:
- java:
- javacard:
- javacard.framework:
3
- javacard.security:
1
- javacardx:
- javacardx.framework.util:
1
- certification_process:
- cert_keywords:
None
- report_filename:
anssi-cc_2009-46en.pdf
- st_filename:
anssi-cc-cible_2009-46en.pdf
- cert_filename:
None
|
- _type:
sec_certs.sample.cc.CCCertificate.PdfData
- report_metadata:
- pdf_file_size_bytes:
244131
- pdf_is_encrypted:
False
- pdf_number_of_pages:
17
- /CreationDate:
D:20100204113104+01'00'
- /Keywords:
- /Producer:
Acrobat Distiller 8.0.0 (Windows)
- /ModDate:
D:20100204113104+01'00'
- pdf_hyperlinks:
http://www.ssi.gouv.fr/, mailto:[email protected]
- st_metadata:
- pdf_file_size_bytes:
683422
- pdf_is_encrypted:
False
- pdf_number_of_pages:
95
- /CreationDate:
D:20091125162947+01'00'
- /Keywords:
- /Producer:
AFPL Ghostscript 8.50
- /ModDate:
D:20091125162947+01'00'
- pdf_hyperlinks:
- cert_metadata:
None
- report_frontpage:
- FR:
- match_rules:
Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developer\(s\)(.+)Evaluation facility(.+)Recognition arrangements
- cert_id:
ANSSI-CC-2009/46
- cert_item:
ID-One Cosmo V7.0-a SmartCard in configuration Standard and Basic JavaCard platform embedded on Atmel Secure Microcontroller Solutions components AT90SC 28872RCU Rev G and Rev E, 28848RCU Rev G and Rev E and embedded with cryptographic library version 00.03.11.05 ToolBox from Atmel Secure Microcontroller Solutions
- cert_item_version:
JavaCard Platform version for any configuration: 7.0-a Optional Code r1.0 High Secure version for each configuration: 071771, 071781 Optional Code CodopAuth r1.0 version for each configuration: 071631, 071641 ToolBox version for any configuration: 00.03.11.05
- ref_protection_profiles:
PP/0304] Java Card System - Standard 2.1.1 Configuration Protection Profile – version 1.0b, August 2003 certified by ANSSI
- cc_version:
Common Criteria version 3.1
- cc_security_level:
EAL 5 augmented ADV_IMP.2, ALC_DVS.2, AVA_VAN.5
- developer:
Oberthur Technologies1 50 quai Michelet 92300 Levallois-Perret, France ATMEL Secure Microcontroller Solutions1 Maxwell Building - Scottish Enterprise technology Park East Kilbride, G75 0QR - Ecosse, Royaume-Uni Sponsor Oberthur Technologies 50 quai Michelet, 92300 Levallois-Perret, France
- cert_lab:
THALES - CEACI (T3S – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France Phone: +33 (0)5 62 88 28 01 or 18, email : [email protected]
- st_frontpage:
None
- cert_frontpage:
None
- report_keywords:
- cc_cert_id:
- DE:
- BSI-DSZ-CC-0421-2008-MA-02:
1
- BSI-DSZ-CC-0421-:
1
- FR:
- DCSSI-2009/11:
1
- ANSSI-CC-2009/46:
18
- cc_protection_profile_id:
- cc_security_level:
- EAL:
- EAL 5:
4
- EAL4:
1
- EAL5:
1
- EAL7:
1
- EAL 4:
1
- EAL 1:
1
- EAL 3:
1
- EAL 7:
1
- EAL 5 augmented:
2
- ITSEC:
- cc_sar:
- ADO:
- ADV:
- ADV_IMP.2:
1
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_TDS:
1
- AGD:
- ALC:
- ALC_DVS.2:
3
- ALC_FLR:
2
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DVS:
1
- ALC_TAT:
1
- ATE:
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
- AVA:
- AVA_VAN.5:
1
- AVA_MSU.3:
2
- AVA_VLA.4:
2
- AVA_VAN:
1
- ASE:
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_REQ:
1
- ASE_SPD:
1
- ASE_TSS:
1
- cc_sfr:
- cc_claims:
- vendor:
- Oberthur:
- Oberthur:
2
- Oberthur Technologies:
19
- eval_facility:
- symmetric_crypto:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- crypto_scheme:
- crypto_protocol:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- crypto_library:
- vulnerability:
- side_channel_analysis:
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- SCP:
- SCP01:
1
- SCP02:
1
- SCP03:
1
- CC:
- CCMB-2006-09-001:
1
- CCMB-2007-09-002:
1
- CCMB-2007-09-003:
1
- CCMB-2007-09-004:
1
- javacard_version:
- JavaCard:
- GlobalPlatform:
- javacard_api_const:
- javacard_packages:
- certification_process:
- st_keywords:
- cc_cert_id:
- DE:
- BSI-DSZ-CC-0421-2008:
1
- BSI-DSZ-CC-0421-2008-MA-02:
1
- BSI-DSZ-CC-0421-2008-MA-01:
1
- FR:
- cc_protection_profile_id:
- cc_security_level:
- EAL:
- EAL5:
3
- EAL5+:
1
- EAL5 augmented:
3
- cc_sar:
- cc_sfr:
- FAU:
- FAU_ARP:
2
- FAU_ARP.1:
4
- FAU_SAR:
1
- FAU_SAR.1:
2
- FAU_GEN:
1
- FAU_GEN.1:
2
- FAU_SAA:
1
- FAU_SAA.1:
2
- FCO:
- FCS:
- FCS_RNG:
4
- FCS_RNG.1:
7
- FCS_RNG.1.1:
1
- FCS_RNG.1.2:
1
- FCS_CKM:
5
- FCS_CKM.1:
3
- FCS_CKM.3:
1
- FCS_CKM.3.1:
1
- FCS_CKM.4:
2
- FCS_CKM.4.1:
1
- FCS_COP:
7
- FCS_COP.1:
7
- FCS_CKM.2:
1
- FCS_CKM.2.1:
1
- FCS_COP.1.1:
1
- FCS_RND:
1
- FDP:
- FDP_IFC:
2
- FDP_IFC.1:
1
- FDP_IFF:
2
- FDP_IFF.1:
10
- FDP_RIP:
9
- FDP_RIP.1:
10
- FDP_ROL:
1
- FDP_ROL.1:
2
- FDP_SDI.2:
1
- FDP_SDI.2.1:
1
- FDP_SDI.2.2:
1
- FDP_SDI.1:
1
- FDP_SDI.1.1:
1
- FDP_ACC:
5
- FDP_ACC.2:
9
- FDP_ACF:
4
- FDP_ACF.1:
18
- FDP_UCT:
1
- FDP_UCT.1:
1
- FDP_ITC:
2
- FDP_ITC.1:
3
- FDP_IFC.2:
2
- FDP_UIT:
1
- FDP_UIT.1:
2
- FDP_ITC.2:
5
- FIA:
- FIA_ATD:
2
- FIA_ATD.1:
3
- FIA_UID:
4
- FIA_UID.2:
1
- FIA_USB.1:
2
- FIA_USB.1.1:
1
- FIA_USB.1.2:
1
- FIA_USB.1.3:
1
- FIA_AFL:
4
- FIA_AFL.1:
8
- FIA_UAU:
6
- FIA_UAU.1:
4
- FIA_UAU.4:
2
- FIA_UAU.7:
2
- FIA_UID.1:
6
- FMT:
- FMT_MSA:
11
- FMT_MSA.2:
1
- FMT_MSA.3:
8
- FMT_SMR:
6
- FMT_SMR.1:
9
- FMT_MSA.1:
6
- FMT_MTD:
3
- FMT_MTD.1:
3
- FMT_MTD.3:
1
- FMT_MTD.3.1:
1
- FMT_SMF:
4
- FMT_SMF.1:
4
- FMT_MOF:
2
- FMT_MOF.1:
2
- FMT_SMR.2:
6
- FMT_MTD.2:
2
- FPR:
- FPR_UNO.1:
5
- FPR_UNO.1.1:
1
- FPR_UNO:
4
- FPT:
- FPT_TDC.1:
3
- FPT_TDC.1.1:
1
- FPT_TDC.1.2:
1
- FPT_FLS:
5
- FPT_FLS.1:
5
- FPT_TST:
2
- FPT_TST.1:
6
- FPT_PHP:
3
- FPT_PHP.3:
2
- FPT_RCV:
3
- FPT_RCV.3:
8
- FPT_RCV.4:
1
- FPT_TDC:
1
- FPT_PHP.2:
3
- FRU:
- FRU_FLT:
1
- FRU_FLT.1:
1
- FRU_RSA:
1
- FRU_RSA.1:
1
- FTP:
- cc_claims:
- D:
- D.APP_CODE:
5
- D.APP_C_DATA:
3
- D.APP_I_DATA:
3
- D.PIN:
6
- D.JCS_CODE:
3
- D.JCS_DATA:
5
- D.SEC_DATA:
7
- D.API_DATA:
3
- D.CRYPTO:
4
- D.CONFIG:
2
- D.SENSITIVE_DATA:
1
- D.ARRAY:
3
- D.KEY:
2
- D.AUDITLOG:
1
- D.LOADFILE:
1
- D.GLPIN:
1
- D.APPLILIFECYC:
1
- D.NB_REMAINTRYGLB:
1
- O:
- O.LOAD:
3
- O.CARD-MANAGEMENT:
3
- O.SID:
1
- O.OPERATE:
1
- O.RESOURCES:
1
- O.FIREWALL:
1
- O.NATIVE:
1
- O.REALLOCATION:
1
- O.SHRD_VAR_CONFID:
1
- O.SHRD_VAR_INTEG:
1
- O.INSTALL:
1
- O.DELETION:
1
- O.OBJ-DELETION:
1
- O.ALARM:
1
- O.TRANSACTION:
1
- O.CIPHER:
1
- O.PIN-MNGT:
1
- O.KEY-MNGT:
1
- O.SECURE_COMPARE:
1
- O.SCP:
3
- O.JAVAOBJECT:
31
- O.APPLET:
16
- O.CODE_PKG:
6
- O.JAVAOBJEC:
4
- O.CODE_PCKG:
8
- T:
- T.CONFIGURATION:
2
- T.CONF_DATA_APPLET:
2
- T.PHYSICAL:
1
- T.CONFID-JCS-CODE:
1
- T.CONFID-APPLI-DATA:
1
- T.CONFID-JCS-DATA:
1
- T.INTEG-APPLI-CODE:
4
- T.INTEG-JCS-CODE:
1
- T.INTEG-APPLI-DATA:
4
- T.INTEG-JCS-DATA:
1
- T.INTEG-APPLICODE:
1
- T.INTEG-APPLIDATA:
1
- T.SID:
2
- T.EXE-CODE:
2
- T.NATIVE:
1
- T.RESSOURCES:
1
- T.INSTALL:
1
- T.DELETION:
1
- T.OBJ-DELETION:
1
- A:
- A.NATIVE:
1
- A.VERIFICATION:
1
- A.APPLET:
1
- R:
- OP:
- OP.PUT:
4
- OP.JAVA:
4
- OP.CREATE:
5
- OP.DELETE_APPLET:
3
- OP.DELETE_PCKG:
2
- OP.DELETE_PCKG_APPLET:
2
- OP.ARRAY_ACCESS:
3
- OP.INSTANCE_FIELD:
2
- OP.INVK_VIRTUAL:
3
- OP.INVK_INTERFACE:
4
- OP.THROW:
3
- OP.TYPE_ACCESS:
3
- OP.SEND:
1
- OP.RECEIVE:
1
- OE:
- OE.NATIVE:
1
- OE.VERIFICATION:
1
- OE.APPLET:
1
- OSP:
- vendor:
- Oberthur:
- Oberthur Technologies:
194
- Oberthur:
1
- OBERTHUR:
2
- eval_facility:
- symmetric_crypto:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- SHA:
- SHA1:
- SHA2:
- SHA-256:
3
- SHA-384:
2
- SHA-512:
2
- SHA-224:
1
- crypto_scheme:
- crypto_protocol:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- crypto_library:
- AtmelToolbox:
- ATMEL Toolbox 00.03.11.05:
2
- vulnerability:
- side_channel_analysis:
- SCA:
- physical probing:
2
- SPA:
1
- DPA:
1
- FI:
- physical tampering:
4
- malfunction:
2
- fault injection:
1
- other:
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- FIPS:
- FIPS PUB 46-3:
5
- FIPS PUB 81:
4
- FIPS PUB 180-2:
2
- FIPS PUB 186-2:
1
- FIPS PUB 197:
1
- FIPS 186-2:
1
- PKCS:
- javacard_version:
- JavaCard:
- GlobalPlatform:
- javacard_api_const:
- javacard_packages:
- java:
- javacard:
- javacard.framework:
3
- javacard.security:
1
- javacardx:
- javacardx.framework.util:
1
- certification_process:
- cert_keywords:
None
- report_filename:
anssi-cc_2009-46en.pdf
- st_filename:
anssi-cc-cible_2009-46en.pdf
- cert_filename:
None
|
dgst |
14cd38ec2e14996d
|
abbcee2f14a12b5e
|